Authentication
Master exploiting authentication mechanisms through real-world scenarios, covering enumeration and brute force, session management, OAuth, MFA/2FA and JWT vulnerabilities.
This module will focus on understanding and mitigating critical vulnerabilities in authentication systems. We will first learn enumeration and brute forcing authentication mechanisms, followed by exploring session management and various attacks that can be performed against insecure implementations. We will cover a range of topics, including JSON Web Tokens (JWT), OAuth vulnerabilities covering missing state parameters, token stealing and many more. Finally, we will explore the significance of MFA/2FA in adding layers of security and exploiting them. All the rooms are equipped with realistic scenarios to practically allow you to explore and address various vulnerabilities.
0%
Enumeration & Brute Force
Enumerate and brute force authentication mechanisms.
0%
Session Management
Learn about session management and the different attacks that can be performed against insecure implementations.
0%
JWT Security
Learn about JWTs, where they are used, and how they need to be secured.
0%
OAuth Vulnerabilities
Learn how the OAuth protocol works and master techniques to exploit it.
0%
Multi-Factor Authentication
Exploiting Multi-Factor Authentication.
0%
Hammer
Use your exploitation skills to bypass authentication mechanisms on a website and get RCE.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
